http://arxiv.org/api/6lEsejqkKGnWSdcFky7S2A8fmoQ2025-04-22T00:00:00-04:00497817515http://arxiv.org/abs/2504.12102v12025-04-16T14:08:25Z2025-04-16T14:08:25ZSuccessive-Cancellation Flip and Perturbation Decoder of Polar Codes In this paper, two decoding algorithms based on Successive Cancellation (SC)
are proposed to improve the error-correction performance of cyclic redundancy
check (CRC)-aided polar codes while aiming for a low-complexity implementation.
Comparisons with Dynamic SC Flip (DSCF) and SC Perturbation (SCP) are carried
out since the proposed DSCF and Perturbation (DSCFP) and Perturbed DSCF (PDSCF)
algorithms combine both methods. The analysis includes comparisons with several
code lengths $N$ and various number of decoding attempts $T_{max}$. For
$N=1024$ and the coding rate $R=\frac{1}{2}$, the DSCFP and the SCP algorithms
with $T_{max}=17$ are bested by approximately $0.1$\,dB at block error rate
(BLER) of $0.001$. At $\text{BLER}=10^{-6}$ and for $T_{max}=64$, the gain is
of $0.375$ dB and $>0.5$ dB with respect to DSCF and SCP, respectively. At high
signal-to-noise ratio, the average computational complexity of the proposed
algorithms is virtually equivalent to that of SC.
Charles PilletIlshat SagitovDominic DeslandesPascal Giard6 pages, 9 figures, 1 table. Presented in IEEE WCNC 2025, Milan,
Italyhttp://arxiv.org/abs/2504.12071v12025-04-16T13:26:30Z2025-04-16T13:26:30ZGeneralized Restart Mechanism for Successive-Cancellation Flip Decoding
of Polar Codes Polar codes are a class of linear error-correction codes that have received a
lot of attention due to their ability to achieve channel capacity in an
arbitrary binary discrete memoryless channel (B-DMC) with low-complexity
successive-cancellation (SC) decoding. However, practical implementations often
require better error-correction performance than what SC decoding provides,
particularly at short to moderate code lengths. Successive-cancellation flip
(SCF) decoding algorithm was proposed to improve error-correction performance
with an aim to detect and correct the first wrongly estimated bit in a codeword
before resuming SC decoding. At each additional SC decoding trial, i.e.,
decoding attempt beyond the initial unsuccessful trial, one bit estimated as
the least reliable is flipped. Dynamic SCF (DSCF) is a variation of SCF, where
multiple bits may be flipped simultaneously per trial. Despite the improved
error-correction performance compared to the SC decoder, SCF-based decoders
have variable execution time, which leads to high average execution time and
latency. In this work, we propose the generalized restart mechanism (GRM) that
allows to skip decoding computations that are identical between the initial
trial and any additional trial. Under DSCF decoding with up to 3-bit flips per
decoding trial, our proposed GRM is shown to reduce the average execution time
by 25% to 60% without any negative effect on error-correction performance. The
proposed mechanism is adaptable to state-of-the-art latency-reduction
techniques. When applied to Fast-DSCF-3 decoding, the additional reduction
brought by the GRM is 15% to 22%. For the DSCF-3 decoder, the proposed
mechanism requires approximately 4% additional memory.
Ilshat SagitovCharles PilletAlexios Balatsoukas-StimmingPascal Giard10.1007/s11265-025-01949-8Accepted in Journal of Signal Processing Systems, 21 pages, 8
figures, 6 tableshttp://arxiv.org/abs/2504.12009v12025-04-16T12:05:30Z2025-04-16T12:05:30ZNetwork-Centric Countermeasures Against Integrated Sensing Enabled
Jamming Adversaries Recent developments in Integrated Sensing and Communication have led to new
adversarial models in wireless security through Integrated Sensing and Jamming
(ISAJ) adversaries. ISAJ adversaries, owing to their sensing capabilities, are
known to inject jamming energy over the victim's frequency band, and also use
generalized energy measurements on various network frequencies to detect the
presence of countermeasures. Existing countermeasures against such ISAJ
adversaries are laid under the assumption that the adversary does not have the
knowledge of the countermeasure. However, according to Kerchoffs' principle in
cryptography, security of a countermeasure should only rely on the secret-keys,
not on the obfuscation of the countermeasure. On testing the security of
existing countermeasures, we observe that they violate Kerchoffs' principle,
thus motivating the need for new countermeasures. In this regard, we propose a
novel network-centric countermeasure against ISAJ adversaries, wherein a group
of users in the network assist the victim to reliably communicate her messages
in a covert manner. Firstly, we analyse the error performance of the proposed
countermeasure, and study its behavior on the number of assisting users in the
network. Subsequently, to validate its security against Kerchoffs' principle,
we study the Shannon's entropy associated with the presence of the victim's
messages in the network and analyse its behaviour as a function of the number
of assisting users. Finally, to study the interplay between reliability and
covertness, we pose interesting optimization problems and solve them to choose
the underlying parameters of the countermeasure and the number of assisting
users.
Soumita HazraJ. Harshan8 pages. To appear in the proceedings of WiOpt 2025http://arxiv.org/abs/2504.09310v22025-04-16T11:25:54Z2025-04-12T19:05:00ZConformal Calibration: Ensuring the Reliability of Black-Box AI in
Wireless Systems AI is poised to revolutionize telecommunication networks by boosting
efficiency, automation, and decision-making. However, the black-box nature of
most AI models introduces substantial risk, possibly deterring adoption by
network operators. These risks are not addressed by the current prevailing
deployment strategy, which typically follows a best-effort train-and-deploy
paradigm. This paper reviews conformal calibration, a general framework that
moves beyond the state of the art by adopting computationally lightweight,
advanced statistical tools that offer formal reliability guarantees without
requiring further training or fine-tuning. Conformal calibration encompasses
pre-deployment calibration via uncertainty quantification or hyperparameter
selection; online monitoring to detect and mitigate failures in real time; and
counterfactual post-deployment performance analysis to address "what if"
diagnostic questions after deployment. By weaving conformal calibration into
the AI model lifecycle, network operators can establish confidence in black-box
AI models as a dependable enabling technology for wireless systems.
Osvaldo SimeoneSangwoo ParkMatteo Zecchinsubmitted for a journal publicationhttp://arxiv.org/abs/2504.11978v12025-04-16T11:17:41Z2025-04-16T11:17:41ZOn the Intersection and Composition properties of conditional
independence Compositional graphoids are fundamental discrete structures which appear in
probabilistic reasoning, particularly in the area of graphical models. They are
semigraphoids which satisfy the Intersection and Composition properties. These
important properties, however, are not enjoyed by general probability
distributions. We survey what is known in terms of sufficient conditions for
Intersection and Composition and derive a set of new sufficient conditions in
the context of discrete random variables based on conditional information
inequalities for Shannon entropies.
Tobias Boege12 pages; submitted to WUPES '25http://arxiv.org/abs/2504.11960v12025-04-16T10:43:23Z2025-04-16T10:43:23ZOn Codes from Split Metacyclic Groups The paper presents a comprehensive study of group codes from non-abelian
split metacyclic group algebras. We derive an explicit Wedderburn-like
decomposition of finite split metacyclic group algebras over fields with
characteristic coprime to the group order. Utilizing this decomposition, we
develop a systematic theory of metacyclic codes, providing their algebraic
description and proving that they can be viewed as generalized concatenated
codes with cyclic inner codes and skew quasi-cyclic outer codes. We establish
bounds on the minimum distance of metacyclic codes and investigate the class of
induced codes. Furthermore, we show the feasibility of constructing a partial
key-recovery attack against certain McEliece-type cryptosystems based on
metacyclic codes by exploiting their generalized concatenated structure.
Kirill Vedenevhttp://arxiv.org/abs/2410.00078v22025-04-16T10:42:51Z2024-09-30T16:26:40ZShuffled Linear Regression via Spectral Matching Shuffled linear regression (SLR) seeks to estimate latent features through a
linear transformation, complicated by unknown permutations in the measurement
dimensions. This problem extends traditional least-squares (LS) and Least
Absolute Shrinkage and Selection Operator (LASSO) approaches by jointly
estimating the permutation, resulting in shuffled LS and shuffled LASSO
formulations. Existing methods, constrained by the combinatorial complexity of
permutation recovery, often address small-scale cases with limited
measurements. In contrast, we focus on large-scale SLR, particularly suited for
environments with abundant measurement samples. We propose a spectral matching
method that efficiently resolves permutations by aligning spectral components
of the measurement and feature covariances. Rigorous theoretical analyses
demonstrate that our method achieves accurate estimates in both shuffled LS and
shuffled LASSO settings, given a sufficient number of samples. Furthermore, we
extend our approach to address simultaneous pose and correspondence estimation
in image registration tasks. Experiments on synthetic datasets and real-world
image registration scenarios show that our method outperforms existing
algorithms in both estimation accuracy and registration performance.
Hang LiuAnna ScaglioneThis work has been submitted to the IEEE for possible publicationhttp://arxiv.org/abs/2410.17754v32025-04-16T09:50:33Z2024-10-23T10:31:34ZPuncturing Quantum Stabilizer Codes Classical coding theory contains several techniques to obtain new codes from
other codes, including puncturing and shortening. For quantum codes, a form of
puncturing is known, but its description is based on the code space rather than
its generators. In this work, we generalize the puncturing procedure to allow
more freedom in the choice of which coded states are kept and which are
removed. We describe this puncturing by focusing on the stabilizer matrix
containing the generators of the code. In this way, we are able to explicitly
describe the stabilizer matrix of the punctured code given the stabilizer
matrix of the original stabilizer code. The additional freedom in the procedure
also opens up new ways to construct new codes from old, and we present several
ways to utilize this for the search of codes with good or even optimal
parameters. In particular, we use the construction to obtain codes whose
parameters exceed the best previously known. Lastly, we generalize the proof of
the Griesmer bound from the classical setting to stabilizer codes since the
proof relies heavily on the puncturing technique.
Jaron Skovsted GundersenRené Bødker ChristensenMarkus GrasslPetar PopovskiRafał WisniewskiAccepted version for IEEE Journal on Selected Areas in Information
Theoryhttp://arxiv.org/abs/2402.10504v42025-04-16T09:25:06Z2024-02-16T08:27:55ZResilience of Rademacher chaos of low degree The resilience of a Rademacher chaos is the maximum number of adversarial
sign-flips that the chaos can sustain without having its largest atom
probability significantly altered. Inspired by probabilistic lower-bound
guarantees for the resilience of linear Rademacher chaos, obtained by Bandeira,
Ferber, and Kwan (Advances in Mathematics, Vol. $319$, $2017$), we provide
probabilistic lower-bound guarantees for the resilience of Rademacher chaos of
arbitrary yet sufficiently low degree.
Our main results distinguish between Rademacher chaos of order two and those
of higher order. In that, our first main result pertains to the resilience of
decoupled bilinear Rademacher forms where different asymptotic behaviour is
observed for sparse and dense matrices. For our second main result, we
bootstrap our first result in order to provide resilience guarantees for
quadratic Rademacher chaos. Our third main result, generalises the first and
handles the resilience of decoupled Rademacher chaos of arbitrary yet
sufficiently low order.
Our results for decoupled Rademacher chaos of order two and that of higher
order whilst are established through the same conceptual framework, differ
substantially. A difference incurred due to the implementation of the same
conceptual argument. The order two result is established using Dudley's maximal
inequality for sub-Gaussian processes, the Hanson-Wright inequality, as well as
the Kolmogorov-Rogozin inequality. To handle higher order chaos, appeals to
Dudley's inequality as well as the Hanson-Wright inequality are replaced with
tools suited for random tensors. Appeals to the Hanson-Wright inequality are
replaced with appeals to a concentration result for random tensors put forth by
Adamczak and Wolff.
Our results are instance-dependent and thus allow for the efficient
computation of resilience guarantees provided the order of the chaos is
constant.
Elad Aigner-HorevDaniel RosenbergRoi WeissSmall corrections from previous versionhttp://arxiv.org/abs/2504.02376v22025-04-16T09:24:22Z2025-04-03T08:10:25ZAn Efficient Reservation Protocol for Medium Access: When Tree Splitting
Meets Reinforcement Learning As an enhanced version of massive machine-type communication in 5G, massive
communication has emerged as one of the six usage scenarios anticipated for 6G,
owing to its potential in industrial internet-of-things and smart metering.
Driven by the need for random multiple-access (RMA) in massive communication,
as well as, next-generation Wi-Fi, medium access control has attracted
considerable recent attention. Holding the promise of attaining
bandwidth-efficient collision resolution, multiaccess reservation no doubt
plays a central role in RMA, e.g., the distributed coordination function (DCF)
in IEEE 802.11. In this paper, we are interested in maximizing the bandwidth
efficiency of reservation protocols for RMA under quality-of-service
constraints. Particularly, we present a tree splitting based reservation
scheme, in which the attempting probability is dynamically optimized by
partially observable Markov decision process or reinforcement learning (RL).
The RL-empowered tree-splitting algorithm guarantees that all these terminals
with backlogged packets at the beginning of a contention cycle can be
scheduled, thereby providing a first-in-first-out service. More importantly, it
substantially reduces the reservation bandwidth determined by the communication
complexity of DCF, through judiciously conceived coding and interaction for
exchanging information required by distributed ordering. Simulations
demonstrate that the proposed algorithm outperforms the CSMA/CA based DCF in
IEEE 802.11.
Yutao ChenWei Chenhttp://arxiv.org/abs/2410.03395v22025-04-16T08:50:18Z2024-10-04T12:58:31ZLocal Clustering and Global Spreading of Receptors for Optimal Spatial
Gradient Sensing Spatial information from cell-surface receptors is crucial for processes that
require signal processing and sensing of the environment. Here, we investigate
the optimal placement of such receptors through a theoretical model that
minimizes uncertainty in gradient estimation. Without requiring a priori
knowledge of the physical limits of sensing or biochemical processes, we
reproduce the emergence of clusters that closely resemble those observed in
real cells. On perfect spherical surfaces, optimally placed receptors spread
uniformly. When perturbations break their symmetry, receptors cluster in
regions of high curvature, massively reducing estimation uncertainty. This
agrees with mechanistic models that minimize elastic preference discrepancies
between receptors and cell membranes. We further extend our model to motile
receptors responding to cell-shape changes and external fluid flow,
demonstrating the relevance of our model in realistic scenarios. Our findings
provide a simple and utilitarian explanation for receptor clustering at
high-curvature regions when high sensing accuracy is paramount.
Albert AlonsoRobert G. EndresJulius B. Kirkegaard10.1103/PhysRevLett.134.158401This version has been accepted for publication in Physical Review
Letters. The final version is available at
https://doi.org/10.1103/PhysRevLett.134.158401. Title has changedPhys. Rev. Lett. 134, 158401 (2025)http://arxiv.org/abs/2501.18308v22025-04-16T08:25:10Z2025-01-30T12:35:21ZZero Estimation Cost Strategy for Witsenhausen Counterexample with
Causal Encoder We propose a zero estimation cost (ZEC) scheme for causal-encoding
noncausal-decoding vector-valued Witsenhausen counterexample based on the
coordination coding result. In contrast to source coding, our goal is to
communicate a controlled system state. The introduced ZEC scheme is a joint
control-communication approach that transforms the system state into a sequence
that can be efficiently communicated using block coding. Numerical results show
that our approach significantly reduces the power required for achieving
zero-estimation-cost state reconstruction at the decoder. In the second part,
we introduce a more general non-zero estimation cost (Non-ZEC) scheme. We
observe numerically that the Non-ZEC scheme operates as a time-sharing
mechanism between the two-point strategy and the ZEC scheme. Overall, by
leveraging block-coding gain, our proposed methods substantially improve the
power-estimation trade-off for Witsenhausen counterexample.
Mengyuan ZhaoTobias J. OechteringMaël Le TreustThis file is provided with the complete derivation of Theorem IV.1http://arxiv.org/abs/2209.13636v32025-04-16T08:23:43Z2022-09-27T19:05:22ZLocal Grammar-Based Coding Revisited In the setting of minimal local grammar-based coding, the input string is
represented as a grammar with the minimal output length defined via simple
symbol-by-symbol encoding. This paper discusses four contributions to this
field. First, we invoke a simple harmonic bound on ranked probabilities, which
reminds Zipf's law and simplifies universality proofs for minimal local
grammar-based codes. Second, we refine known bounds on the vocabulary size,
showing its partial power-law equivalence with mutual information and
redundancy. These bounds are relevant for linking Zipf's law with the neural
scaling law for large language models. Third, we develop a framework for
universal codes with fixed infinite vocabularies, recasting universal coding as
matching ranked patterns that are independent of empirical data. Finally, we
analyze grammar-based codes with finite vocabularies being empirical rank
lists, proving that that such codes are also universal. These results extend
foundations of universal grammar-based coding and reaffirm previously stated
connections to power laws for human language and language models.
Łukasz Dębowski41 pages, no figureshttp://arxiv.org/abs/2412.16579v22025-04-16T05:56:53Z2024-12-21T10:56:17ZA generalisation of bent vectors for Butson Hadamard matrices An $n\times n$ complex matrix $M$ with entries in the $k^{\textrm{th}}$ roots
of unity which satisfies $MM^{\ast} = nI_{n}$ is called a Butson Hadamard
matrix. While a matrix with entries in the $k^{\textrm{th}}$ roots typically
does not have an eigenvector with entries in the same set, such vectors and
their generalisations turn out to have multiple applications. A bent vector for
$M$ satisfies $M{\bf x} = \lambda {\bf y}$ where ${\bf x}$ has entries in the
$k^{\textrm{th}}$ roots of unity and all entries of $\textbf{y}$ are complex
numbers of norm $1$. Such a bent vector ${\bf x}$ is self-dual if ${\bf y} =
\mu{\bf x}$ and conjugate self-dual if ${\bf y} = \mu\overline{\bf x}$ for some
$\mu$ of norm $1$.
Using techniques from algebraic number theory, we prove some order conditions
and non-existence results for self-dual and conjugate self-dual bent vectors;
using tensor constructions and Bush-type matrices we give explicit examples. We
conclude with an application to the covering radius of certain non-linear codes
generalising the Reed Muller codes.
José Andrés ArmarioRonan EganHadi KharaghaniPadraig Ó Catháinhttp://arxiv.org/abs/2504.11784v12025-04-16T05:36:52Z2025-04-16T05:36:52ZDALC: Distributed Arithmetic Coding Aided by Linear Codes Distributed Arithmetic Coding (DAC) has emerged as a feasible solution to the
Slepian-Wolf problem, particularly in scenarios with non-stationary sources and
for data sequences with lengths ranging from small to medium. Due to the
inherent decoding ambiguity in DAC, the number of candidate paths grows
exponentially with the increase in source length. To select the correct
decoding path from the set of candidates, DAC decoders utilize the Maximum A
Posteriori (MAP) metric to rank the decoding sequences, outputting the path
with the highest MAP metric as the decoding result of the decoder. However,
this method may still inadvertently output incorrect paths that have a MAP
metric higher than the correct decoding path, despite not being the correct
decoding path. To address the issue, we propose Distributed Arithmetic Coding
Aided by Linear Codes (DALC), which employs linear codes to constrain the
decoding process, thereby eliminating some incorrect paths and preserving the
correct one. During the encoding phase, DALC generates the parity bits of the
linear code for encoding the source data. In the decoding phase, each path in
the set of candidate paths is verified in descending order according to the MAP
metric until a path that meets the verification criteria is encountered, which
is then outputted as the decoding result. DALC enhances the decoding
performance of DAC by excluding candidate paths that do not meet the
constraints imposed by linear codes. Our experimental results demonstrate that
DALC reduces the Bit Error Rate(BER), with especially improvements in skewed
source data scenarios.
Junwei ZhouHaoYun XiaoJianwen XiQiuzhen Lin7 pages, 7 figures